Get my own profile
Public access
View all61 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ee-Peng LimSingapore Management UniversityVerified email at smu.edu.sg
Jiawei HanAbel Bliss Professor of Computer Science, University of IllinoisVerified email at cs.uiuc.edu
Xifeng YanProfessor, Computer Science, Univ. of California at Santa BarbaraVerified email at cs.ucsb.edu
Philip S. YuProfessor of Computer Science, University of Illinons at ChicagoVerified email at cs.uic.edu
Minghui QiuAlibaba GroupVerified email at smu.edu.sg
Jing JiangSchool of Computing, ANU; School of Computing and Information Systems, SMUVerified email at smu.edu.sg
David LoProfessor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
Siyuan LiuSmeal College of Business, Pennsylvania State UniversityVerified email at psu.edu
GOTTIPATI SwapnaAssociate Professor of Information Systems, Singapore Managment UniversityVerified email at smu.edu.sg
Chen ChenGoogle Inc.Verified email at google.com
Liu YangGoogle ResearchVerified email at google.com
Wei GongPhd candidate, Singapore Management UniversityVerified email at smu.edu.sg
Ke WangProfessor of Computing Science, Simon Fraser UniversityVerified email at cs.sfu.ca
Su Mon KyweSecurity ArchitectVerified email at sc.com
Shuhui Wang(王树徽)Professor, Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Palakorn Achananuparp (Aek)School of Computing and Information Systems, Singapore Management UniversityVerified email at smu.edu.sg
Tuan-Anh HoangRMIT Vietnam UniversityVerified email at rmit.edu.vn
Jinbo ZhangPeking UniversityVerified email at pku.edu.cn
Ramayya KrishnanCarnegie Mellon UniversityVerified email at cmu.edu
Bolin DingAlibaba GroupVerified email at alibaba-inc.com